. . "Seems like human error and configuration are the most vulnerable things indeed." . . .